SECURITY
PROTOCOLS and SERVICES
A. Key Management
1. General
- Question 112. How Does One Find Random Numbers for Keys?
- Question 113. What is the Life Cycle of a Key?
2. Public-Key Issues
- Question 114. What Key Management Issues are Involved in
Public-Key Cryptography?
- Question 115. Who Needs a Key Pair?
- Question 116. How Does One Get a Key Pair?
- Question 117. Should a Public Key or Private Key be
Shared Among Users?
- Question 118. What Happens When a Key Expires?
- Question 119. What Happens if I Lose my Private Key?
- Question 120. What Happens if my Private Key is
Compromised?
- Question 121. How Should I Store my Private Key?
- Question 122. How Do I Find Someone Else's Public Key?
3. Certificates
- Question 123. What are Certificates?
- Question 124. How are Certificates Used?
- Question 125. Who Issues Certificates and How?
- Question 126. How Do Certifying Authorities Store their
Private Keys?
- Question 127. How Are Certifying Authorities Susceptible
to Attack?
- Question 128. What if a Certifying Authority's Key is
Lost or Compromised?
- Question 129. What are Certificate Revocation Lists
(CRLs)?
B. Security on the Internet
1. Secure Electronic Mail
- Question 130. What is PEM?
- Question 131. What is S/MIME?
- Question 132. What is PEM-MIME, or What is MOSS?
2. General Security Protocols
- Question 133. What is S-HTTP?
- Question 134. What is SSL?
- Question 135. What is the Difference Between SSL and
S-HTTP?
- Question 136. What is PCT?
- Question 137. What is S/WAN?
3. Electronic Commerce
- Question 138. What is Electronic Money?
- Question 139. What is iKP?
- Question 140. What is SEPP?
- Question 141. What is Secure Courier?
- Question 142. What is STT?
4. Authentication Systems
- Question 143. What are Identification Schemes and
Authentication Protocols?
- Question 144. What is Kerberos?
C. Cryptography APIs
Question 145. What are CAPIs?